Friday, May 10, 2019

Computer Security and Biometrics Research Paper

Computer guarantor and Biometrics - Research Paper ExampleIt is evidently clear from the discussion that due to recurrent technological developments, in constructation and communication technology frequently diverts in new dimensions. The research and development in the context of information and communication technology is very effective. Moreover, the new and advanced form of technology has also facilitated vulnerabilities and threats to be more intelligent. Organizations require advanced protection and security from these threats and vulnerabilities. In smart set to protect information assets, organizations emphasize on implementing logical and physical controls to protect and secure organizational assets. pledge issues arsehole lead to m both different aspects. For example, if the server containing customer data is br distributivelyed, organization will support its credibility and trust among the customer and that will result in business deviation. Similarly, if a critica l brass is hacked by internal or external sources, organizations financial data along with goals and objectives can be revealed to other competitors. For securing logical and physical threats, organizations implement firewalls to deploy packet filtering, eliminating viruses and malicious codes, intrusion catching system to continuously sense the behavior of the network, biometric systems for physical authentication of employees, incident retort teams to recover the loss on immediate basis and IP cameras to monitor their critical information assets on the network. System Security As per (Dhillon 451), there are three types of controls that will mete out the three systems i.e. formal, informal and technical. Example of each one of these is illustrated as Formal control Modifying organization structure Informal control Security sensation Technical control Restricting unauthorized access Formal controls provide assistance to technical controls, as they govern and address issues of integrity in application and data that may lead to high adventure and cost. Likewise, in order to govern formal controls, assignment of jobs and responsibilities is vital, as this allocation of duties and responsibilities will set conjunctive with business objectives. Formal controls are associated with anxiety aspect that will deploy strategic security management practices. The security management will select employees from all departments of the organization where necessary. Moreover, the security management will address data protection legislations, security audits, regulatory compliance, legal and insurance issues, hiring criteria for employees, misconduct, luck assessment, incident management and response etc. Informal controls are associated with security awareness programs considered as the cost effective tool use to aware employees for dos and donts while accessing data or information resources. As risk environment is constantly changing, a comprehensive education and sec urity awareness program is extremely strategic that will conduct periodic awareness sessions for new employees, or new technology or any relevant risk that needs to be addressed. Therefore, the security awareness program should be considered as a common belief system (Dhillon 451). Lastly, the technical control that is not limited to authentication of a exploiter along with assigning proper rights on an application or operating system. In order to put through confidentiality to data, encryption, hashing, encoding methods are adopted by organization. Likewise, smart card is the most popular one (Dhillon 451). Moreover,

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.